Language selection

Search

Patent 2526818 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2526818
(54) English Title: METHOD FOR CONTEXT SENSITIVE CONCEALMENT OF AN INPUT FIELD
(54) French Title: METHODE DE MASQUAGE SENSIBLE AU CONTEXTE D'UNE ZONE DE SAISIE
Status: Dead
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06F 3/023 (2006.01)
  • G06F 3/14 (2006.01)
  • G06F 21/00 (2013.01)
(72) Inventors :
  • GRIGORIEV, NIKOLAI (Canada)
  • THORKELSSON, HARALDUR (Canada)
  • JHAVERI, NATALIE (Canada)
(73) Owners :
  • GRIGORIEV, NIKOLAI (Canada)
  • THORKELSSON, HARALDUR (Canada)
  • JHAVERI, NATALIE (Canada)
(71) Applicants :
  • OZ COMMUNICATIONS (Canada)
(74) Agent: GOUDREAU GAGE DUBUC
(74) Associate agent:
(45) Issued:
(22) Filed Date: 2005-11-14
(41) Open to Public Inspection: 2007-05-14
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data: None

Abstracts

Sorry, the abstracts for patent document number 2526818 were not found.

Claims

Note: Claims are shown in the official language in which they were submitted.




7


WHATIS CLAIMED IS:


1. A method for displaying characters on a device comprising a
display and a keypad, the method comprising the steps of:
composing a series of characters using the keypad, said series of
characters forming a character string;
displaying said character string on the display;
completing composition of said character string; and
concealing said character string completion of composition.

2. The method of Claim 1, wherein the keypad comprises twelve
numeric keys and each character of said series of characters is composed by
actuating a particular one of said numeric keys a predetermined number of
times, a delay between successive actuations being less than a predetermined
limit.

3. The method of Claim 2, wherein said predetermined limit is one
(1) second.

4. The method of Claim 1, wherein each character of said character
string is displayed immediately following its composition.

5. The method of Claim 1, wherein the display comprises an input
field and said character string is displayed in said input field.

6. The method of Claim 5, wherein said input field is a text edit field.
7. The method of Claim 5, wherein said composition completing step
comprises moving a focus away from said input field.



8


8. The method of Claim 7, further comprising the step of, following
said concealing step, of revealing said character string when said focus is
moved to said input field within an allotted period of time.

9. The method of Claim 8, wherein said allotted period of time is 60
seconds.

10. The method of Claim 1, wherein said composition completing step
comprises ceasing character composition during a predetermined period of
time.

11. The method of Claim 10, wherein predetermined period of time is
3 seconds.

12. The method of Claim 1, wherein said concealing step comprises
masking each character of said character string using a wildcard.

13. The method of Claim 12, wherein said wildcard is an asterisk.

14. The method of Claim 1, wherein said character string is a
password and further comprising the step of

Description

Note: Descriptions are shown in the official language in which they were submitted.



CA 02526818 2005-11-14
-1-

TITLE
METHOD FOR CONTEXT SENSITIVE CONCEALMENT OF AN INPUT FIELD
FIELD OF THE INVENTION

The present invention relates to a method for the context sensitive
concealment
of an input field. In particular, the present invention relates to a method
for
concealing and revealing sensitive data, especially on devices using twelve
key
keypads.

BACKGROUND TO THE INVENTION

As known in the art, entry of alphanumeric characters on devices equipped with
a standard twelve (12) key mobile phone keypad typically comprises either
pressing multiple keys (chording) or tapping (actuating) a key multiple times
(multi-tap) to select, or compose, a given alphanumeric character. As known in
the art using the multi-tap method, a short delay (referred to hereinafter as
a
"composition timeout") is provided during within which if the same key is
pressed, the alphanumeric character displayed is replaced by the next
character. The composition timeout is typically fairly short, on the order of
one
second. Failure to enter a tap on the same key during the composition timeout
leads to the currently displayed character being seized by the device and
fixed
on the display.
In many applications involving the entry of sensitive data such as passwords,
the input field is masked or otherwise concealed during input such that the
actual input remains invisible, effectively proscribing another's ability to
read
sensitive data from the input field. In a traditional environment comprising a
complete keyboard this type of concealment is generally adequate and poses
little problem (although, as will be seen below, this also has drawbacks). In
a
system using the multi-tap method, however, where a certain amount of visual


CA 02526818 2005-11-14
-2-

feed back is required to ensure that the correct character is keyed, complete
concealment of the character in question proves problematic and typically
leads
to many false entries, especially when the user is disturbed during entry.
This
can prove particularly inefficient when entering passwords as many systems
refuse access after a small number of incorrect entries.

One prior art method for concealing characters and even entire input fields
during multi-tap entry is as follows. As characters are composed, they are
made visible to the user in clear text. For example, in order to compose the
character "c" the user taps key 2 thrice, first revealing the character "a"
followed
by "b" and arriving at "c" on the third tap. Once the wished for character has
been composed and seized by the device, the character displayed is
concealed, or masked, by replacing it with a wildcard character such as an
asterisk. However, once the character has been concealed in this fashion,
there is generally no way that the user can view it again. Additionally, and
as
will be understood by a person of skill in the art, as further characters are
entered and concealed in this fashion there is generally no way that the user
can view any (or all) of these characters (as they are masked, again typically
with an asterisk).
Additionally, due to the variety of input modes that exist on many mobile
handsets (for example lowercase mode, uppercase mode, symbol mode,
numeric mode, lowercase mode with capitalizing of the first letter, etc.)
users
frequently enter unexpected or unwanted characters. For example, in "Abc"
mode where the first letter is always capitalized, the user may easily enter
"Password" instead of "password" without noticing it. As passwords are
typically
case-sensitive this can lead to a proliferation of password entry errors. This
drawback is further compounded in that the indicator of the mode currently
active while the user is entering masked data is frequently not clearly
displayed. For example, the current mode indicator is typically located away
from the input field and outside of the user's area of attention (positioned
at a
corner of the screen, for example).


CA 02526818 2005-11-14
-3-

Similar drawbacks also arise in more conventional devices which include full
keyboards (such as the ubiquitous QWERTY keyboard) combined with a
single-tap entry method. As discussed above, in these cases the character
being entered is completely invisible and is typically replaced immediately
with
an asterisk. Due to the low quality of some keypads as well as their small
size,
especially on hand held devices, the probability that a wrong key is
depressed,
two keys depressed at once or the same key depressed twice is high resulting
in a large number of errors.
SUMMARY OF THE INVENTION

In order to overcome the above and other drawbacks, there is disclosed a
method for displaying characters on a device comprising a display and a
keypad. The method comprises the steps of composing a series of characters
using the keypad, the series of characters forming a character string,
displaying
the character string on the display, completing composition of the character
string and concealing the character string following completion of
composition.

BRIEF DESCRIPTION OF THE FIGURES

Figure 1 is a front plan view of a mobile device in accordance with and
illustrative embodiment of the present invention;

Figures 2A through 2C provide front plan views of a device implementing one
method for the display of sensitive data according to the prior art; and

Figures 3A through 3E provide front plan views of a device implementing a
method for the display of sensitive data according to an illustrative
embodiment
of the present invention.


CA 02526818 2005-11-14
-4-

DETAILED DESCRIPTION OF THE ILLUSTRATIVE EMBODIMENTS
Referring now to Figure 1, a mobile device, generally referred to using the
reference numeral 10, will now be described. The mobile device 10 is
comprised of a keypad 12, illustratively comprised of a twelve (12) key
numeric
keypad 14 and additional function keypad 16, which can include, for example, a
four-way scroll key with centre select 18, soft-keys, application-keys, edit
and
clear keys, send & end keys, multimedia keys, etc..

Still referring to Figure 1, the mobile device 10 is additionally equipped
with a
display 20, such as an active matrix colour display, for viewing locally
stored
data such as contact lists, call logs, configuration settings, etc., as well
as web
pages, e-mail, etc.. As known in the art, the display 20 and associated
operating system software (not shown) provide the interaction and display
capabilities which allow a user to interact with the device 10 as well as
other
devices interconnected with the device 10 via a communications link, such as
web servers, e-mail servers, etc.. The display 20 typically supports the
formatted presentation of information in a variety of forms including text
strings
22, graphics/pictures 24 and icons 26. Additionally, information is typically
displayed along with one or more control objects, such as buttons 28, check
boxes 30, sliders (not shown) and edit boxes 32, which allow the user to
manipulate or otherwise interact with the displayed information. Typically,
using
the four-way scroll key 18, for example to control a cursor 34, the user can
migrate (shift focus) between and interact with the control objects.
Still referring to Figure 1, by activating an edit box (or input field) as in
32, the
user can input data, such as alphanumeric characters using, for example, the
twelve (12) key numeric keypad 14 and the multi-tap character input method as
described hereinabove.
Referring now to Figures 2A through 2C, as discussed above one prior art
method for entering sensitive strings (such as passwords) involves, as the


CA 02526818 2005-11-14
-5-

characters are composed, making them visible to the user in clear text. Once
the wished for character has been composed and seized by the device, the
character is concealed by replacing it with an asterisk. For example, in
Figure
2A, the character "d" has been added to a character string 36 into the input
field
32 using the multi-tap method by pressing numeric key "3" (reference 38 on
Figure 1) once. Referring now to Figure 2B, after a shortly delay (as
discussed
above, typically one second) the character is seized and concealed with an
asterisk. This prior art method allows the user to delete characters already
seized and concealed, for example by backspacing over the character or the
like. Additionally, and referring now to Figure 2C, the prior art method also
allows for the insertion of additional characters at any point within the
character
string 36, however the other characters remain concealed behind an asterisk.
Referring now to Figure 3A, in order to simplify the correct entry of
sensitive
data into an input field 32, the user begins by entering the sensitive
character
string 36, for example using the twelve (12) key numeric keypad 14 and the
multi-tap character input method as described hereinabove. However, instead
of concealing each character immediately following its composition, the
characters of the entire sensitive character string 36 remain visible during
its
composition. The character string 36 is only concealed on completion of its
composition, which can be indicated to the device 10 by the user in a number
of ways, for example the user does not press any key for a configurable short
period of time (for example 3 seconds) or the user moves focus away from the
input field 32 in question (for example by moving the cursor 34 to another
input
field or control object).

Referring now to Figure 3B, following concealment of the character string 36,
the user may reveal the concealed character string 36 by performing an
additional action within an aflotted period of time (for example 60 seconds).
Examples of additional actions include, for example, the user attempting to
add
an additional character to the character string 36 already entered or the user
returning focus to the input field 32 and positioning the cursor 34 left or
right of


CA 02526818 2005-11-14
-6-

the concealed characters. Referring now to Figure 3C, at this point the
concealed character string 36 is revealed and user is free to move the cursor
34 to the position where it is wished to make the changes.

In order to protect the sensitive character string 34, in the event the user
fails to
reveal the concealed character string 36 within the allotted period of time,
the
concealed character string remains so, even if the user attempts to add an
additional character to the string or returns focus to the input field 32.

The described method also foresees a number of other features which may
prove opportune in a given implementation. For example, if the input field 34
is
for entering a password and the password entered into input field 34 is used
successfully, the input field becomes non-editable. Additionally, and
referring to
Figure 3D, if the user returns focus to the input field 32, the entire
concealed
character string 34 is selected and the cursor is not displayed. Referring to
Figure 3E, attempted entry of characters into the input field 32 at this point
results in the concealed character string 36 being erased. Additionally, in
order
to provide the user with an indication of the current status of the input
field, an
indicator 40 as to the entry mode currently active for the input field 32 may
be
provided for. Furthermore, as many of the parameters used in support of the
method as described herein are configurable, a specific entry mode to the
input
field 34, for example in order to provide the user with a familiar context
over
time for entry of sensitive data such as passwords, can be a pre-configured
default or can be based on a user's previous configuration.
Although the present invention has been described hereinabove by way of an
illustrative embodiment thereof, this embodiment can be modified at will,
within
the scope of the present invention, without departing from the spirit and
nature
of the subject of the present invention.

Representative Drawing

Sorry, the representative drawing for patent document number 2526818 was not found.

Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date Unavailable
(22) Filed 2005-11-14
(41) Open to Public Inspection 2007-05-14
Dead Application 2008-02-15

Abandonment History

Abandonment Date Reason Reinstatement Date
2007-02-15 FAILURE TO RESPOND TO OFFICE LETTER
2007-08-22 FAILURE TO COMPLETE
2007-11-14 FAILURE TO PAY APPLICATION MAINTENANCE FEE

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Application Fee $400.00 2005-11-14
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
GRIGORIEV, NIKOLAI
THORKELSSON, HARALDUR
JHAVERI, NATALIE
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Description 2005-11-14 6 281
Claims 2005-11-14 2 50
Cover Page 2007-05-03 1 19
Abstract 2007-05-14 1 3
Correspondence 2005-12-29 1 24
Assignment 2005-11-14 3 90
Correspondence 2007-05-15 1 20
Drawings 2005-11-14 4 97